Picture for Yun Shen

Yun Shen

JADES: A Universal Framework for Jailbreak Assessment via Decompositional Scoring

Add code
Aug 28, 2025
Viaarxiv icon

The Ripple Effect: On Unforeseen Complications of Backdoor Attacks

Add code
May 16, 2025
Viaarxiv icon

The Challenge of Identifying the Origin of Black-Box Large Language Models

Add code
Mar 06, 2025
Figure 1 for The Challenge of Identifying the Origin of Black-Box Large Language Models
Figure 2 for The Challenge of Identifying the Origin of Black-Box Large Language Models
Figure 3 for The Challenge of Identifying the Origin of Black-Box Large Language Models
Figure 4 for The Challenge of Identifying the Origin of Black-Box Large Language Models
Viaarxiv icon

Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream Applications

Add code
Feb 02, 2025
Viaarxiv icon

Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution

Add code
Aug 30, 2024
Figure 1 for Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution
Figure 2 for Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution
Figure 3 for Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution
Figure 4 for Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution
Viaarxiv icon

Breaking Agents: Compromising Autonomous LLM Agents Through Malfunction Amplification

Add code
Jul 30, 2024
Viaarxiv icon

Rapid Adoption, Hidden Risks: The Dual Impact of Large Language Model Customization

Add code
Feb 15, 2024
Viaarxiv icon

FAKEPCD: Fake Point Cloud Detection via Source Attribution

Add code
Dec 18, 2023
Viaarxiv icon

Composite Backdoor Attacks Against Large Language Models

Add code
Oct 11, 2023
Figure 1 for Composite Backdoor Attacks Against Large Language Models
Figure 2 for Composite Backdoor Attacks Against Large Language Models
Figure 3 for Composite Backdoor Attacks Against Large Language Models
Figure 4 for Composite Backdoor Attacks Against Large Language Models
Viaarxiv icon

Prompt Backdoors in Visual Prompt Learning

Add code
Oct 11, 2023
Figure 1 for Prompt Backdoors in Visual Prompt Learning
Figure 2 for Prompt Backdoors in Visual Prompt Learning
Figure 3 for Prompt Backdoors in Visual Prompt Learning
Figure 4 for Prompt Backdoors in Visual Prompt Learning
Viaarxiv icon